Conference PaperPDF Available

Performance gain of full duplex over half duplex under bidirectional traffic asymmetry

Authors:
  • DOCOMO Beijing Communications Laboratories Co.,Ltd.
  • Docomo Beijing-Labs, Beijing, China

Abstract and Figures

Recent work has demonstrated the advantage of full-duplex (FD) network over half-duplex (HD) network in bidirectional sum rate under the assumption of full-buffer and aymmetric uplink-downlink traffics. In this paper, we consider asymmetric bidirectional traffics, and study the performance gain of FD network over both the traditional time-division duplex (TDD) network with static time slot splitting for uplink and downlink and the dynamic TDD with adaptive time slot splitting according to bidirectional traffics requirements. We use the number of users supported by the networks as performance metric, which is defined as the minimum of the number of users supported in uplink and downlink given random data rate requirements of users. To maximize the number of supported users, bidirectional time slot splitting is optimized for dynamic TDD network, and bidirectional power control at both BSs and users is optimized in FD network. Numerical results show the evident gain of FD network over traditional TDD for different levels of traffic asymmetry, and the gain over dynamic TDD decreases with the increase of traffic asymmetry.
Content may be subject to copyright.
Performance Gain of Full Duplex over Half Duplex
under Bidirectional Traffic Asymmetry
Juan Liu, Shengqian Han, Wenjia Liu
Beihang University, Beijing, China
Email: {liujuan, sqhan, liuwenjia}@buaa.edu.cn
Yong Teng, Naizheng Zheng
Nokia Networks, Beijing, China
Email: {yong.teng, naizheng.zheng}@nokia.com
Abstract—Recent work has demonstrated the advantage of
full-duplex (FD) network over half-duplex (HD) network in
bidirectional sum rate under the assumption of full-buffer and
symmetric uplink-downlink traffics. In this paper, we consider
asymmetric bidirectional traffics, and study the performance gain
of FD network over both the traditional time-division duplex
(TDD) network with static time slot splitting for uplink and
downlink and the dynamic TDD with adaptive time slot splitting
according to bidirectional traffics requirements. We use the
number of users supported by the networks as performance
metric, which is defined as the minimum of the number of
users supported in uplink and downlink given random data rate
requirements of users. To maximize the number of supported
users, bidirectional time slot splitting is optimized for dynamic
TDD network, and bidirectional power control at both BSs and
users is optimized in FD network. Numerical results show the
evident gain of FD network over traditional TDD for different
levels of traffic asymmetry, and the gain over dynamic TDD
decreases with the increase of traffic asymmetry.
I. INT ROD UC TI ON
Network densification with small cells in the fifth-
generation cellular systems (5G) significantly increases the
variation in traffic loads between different cells [1]. Moreover,
time-varying traffic asymmetry for uplink and downlink within
each cell is expected due to the proliferation of diverse appli-
cations for smart wireless devices, users’ mobility behaviour
and application usage behaviour, etc. Therefore, technologies
to deal with the spatio-temporally evolving bidirectional traffic
asymmetry are needed in 5G [2].
Frequency division duplex (FDD) systems are generally rec-
ognized as difficult to handle bidirectional traffic asymmetry
because of the equally paired frequency usage in downlink and
uplink. Asymmetrical FDD carrier aggregation by using more
frequency bands in one direction can solve the problem to a
certain extent, which however requires more transceivers at
users, leading to increased cost and power consumption [2].
By contrast, time division duplex (TDD) systems have the
capability to handle asymmetric bidirectional traffics. In tra-
ditional macro cell deployment scenarios, an asymmetric time
slot configuration can be employed for uplink and downlink,
which however needs to be used in all cells across the entire
network in order to avoid the detrimental opposite-directional
interference, e.g., the interference generated by a downlink
This work was supported in part by Nokia Networks, Beijing, China and
by the National Natural Science Foundation of China (No. 61301084).
transmitting base station (BS) to an uplink receiving BS.
The synchronous time slot configuration is highly inefficient
in small cell networks because of the spatio-temporal traffic
asymmetry, which motivates the investigation of cell-specific
dynamic TDD technology [3, 4]. The mitigation of opposite-
directional interference is a key challenge for dynamic TDD,
and various interference control methods have been proposed
in the literature, such as power control [5], access management
[6], coordinated beamforming [7], and cell clustering [1, 8].
Full duplex (FD) communication can be regarded as an
enhanced dynamic TDD in the sense that both uplink and
downlink in each cell operate simultaneously so that time
slot splitting is no longer necessary, which therefore can
naturally support the requirements of asymmetric bidirectional
traffics. FD communication was long believed impossible in
wireless system design due to the severe self-interference
within the same transceiver. However, the plausibility of FD
technique was approved by recent tremendous progress in self-
interference cancellation, and nearly doubled link performance
over the half duplex (HD) system was demonstrated for short-
range point-to-point communications [9,10]. The performance
of FD network has also been analyzed based on stochastic
geometry in [11–14], where evident gain in bidirectional sum
rate over the traditional HD network was shown when self-
interference in FD nodes is well controlled. However, the
existing analysis on the advantages of FD network is based
on the assumption either explicitly or implicitly that both BSs
and users have full buffer traffic and uplink-downlink traffics
are symmetric, e.g., in [12].
In this paper, we investigate the performance gain of FD
network over HD network including both traditional TDD
and dynamic TDD, where bidirectional traffic asymmetry is
considered. To maximize the number of users supported by
the networks, which is defined as the minimum of the number
of users supported in uplink and downlink, bidirectional time
slot splitting is optimized for dynamic TDD network, and
bidirectional power control at both BSs and users is optimized
in FD network for time division multiple access (TDMA)
and frequency division multiple access (FDMA), respectively.
Numerical results show that under asymmetric bidirectional
traffics, both FD network and dynamic TDD network exhibit
large performance gain over the traditional static TDD network
with equal time slot splitting, and the gain of FD network over
IEEE ICC2016-Workshops: W05-Workshop on Novel Medium Access and Resource Allocation for 5G Networks
978-1-5090-0448-5/16/$31.00 ©2016 IEEE
dynamic TDD network decreases with the increase of traffic
asymmetry.
II. SY ST EM MO DE L
Consider a small cell network consisting of multiple geo-
graphically separated cell clusters, which can be formed based
on the existing cell clustering methods designed for dynamic
TDD, e.g., [8]. Assume that the interference between cell
clusters is negligible as in [1], so that cluster-specific uplink-
downlink resource configuration can be employed based on the
bidirectional traffic requirements in each cluster, and different
configurations can be used between clusters. Within each
cluster, following the stochastic geometry model in [11], the
location of BSs follows a homogeneous Poisson point process
(PPP) Ψwith density λin the Euclidean plane, and the
uplink users served in the same time-frequency resource are
distributed according to an independent homogeneous PPP
with the same density λ. In the paper, both FD and HD BSs
are respectively considered, but the users are in HD mode
due to the difficulty of implementing FD at user side. We
consider that each BS serves multiple users in TDMA or
FDMA manner. Then, on the same time-frequency resource a
HD BS can serve one uplink or downlink user, while a FD BS
can serve an uplink user and a downlink user simultaneously,
where every user is associated with its closest BS.
In FD network, the downlink transmission experiences the
interference from both other-cell BSs and all co-scheduled
uplink users. Based on the results in [11], the average downlink
data rate can be expressed as
¯
Rdf (Pb, Pu, W ) = 2πW0λ·(1)
Zr>0
reλπr2Zt>0
erαbu (et1)N0W0
PbF1f(r, t)F2f(r, t)dtdr,
where F1f(r, t) = e
πλr2(et
1)
2
αbu R
(et
1)
2bu
1
1+xαbu/2dx,
F2f(r, t) = eπλr
2αbu
αuu PuW0(et1)
PbW2uu Ry>0
1
1+yαuu/2dy ,
αbu and αuu denote the pathloss exponents between BSs
and users and between users, respectively, W0and Wdenote
the whole bandwidth and the bandwidth allocated to each
uplink user, respectively, Pband Puare the transmit powers of
BSs and users, respectively, N0is the noise power spectrum
density, and Rayleigh fading is considered for small-scale
channels. Herein, flat transmit power spectrum is considered
for both BSs and users, which is Pb
W0and Pu
W, respectively.
The uplink transmission in FD network suffers from the
inter-cell interference generated by both other-cell uplink users
and other-cell BSs, and also the self-interference from itself.
The average uplink data rate can be expressed as [11]
¯
Ruf (Pb, Pu, W )=2πW0λ·(2)
Zr>0
reλπr2
Zt>0
e
rαbu (et
1)(N0W0
+βPb)W
PuW0F1f(r, t)F0
2f(r, t)dtdr,
where F0
2f(r, t) = eπλr
2αbu
αbb PbW(et1)
PuW02bb Ry>0
1
(1+yαbb/2)dy ,
αbb denotes the pathloss exponent between BSs, and β < 1
reflects the level of self-interference cancellation.
From the average data rates in FD network, we can easily
obtain the average data rates in HD network. Specifically,
define Tdand Tuas the fractions of time slots allocated to
downlink and uplink in TDD networks with Td+Tu= 1.
Then, the average downlink rate in HD network can be denoted
by Td¯
Rdh(Pb), where ¯
Rdh(Pb)can be obtained from (1) by
setting the transmit power of users as zeros, i.e., Pu= 0,
which leads to F2f(r, t)=1and ¯
Rdh(Pb)is independent of
W. Similarly, the average uplink rate in HD network can be
denoted by Tu¯
Ruh(Pu), where ¯
Ruh(Pu)can be obtained from
(2) by setting the transmit power of BSs as zeros, i.e., Pb= 0,
which leads to F0
2f(r, t)=1and disappeared self-interference.
In the paper we focus on the interference-limited scenario,
where both BSs and users have minimal transmit powers,
denoted by Pb,min and Pu,min, which ensure that the noise is
negligible compared to the inter-cell interference. By setting
N0= 0 in (1) and (2), we can find that the bidirectional
average data rates in FD network only depend on the ratio
of transmit power of BSs and users, defined as κ=Pb
Pu.
Specifically, the bidirectional average data rates in FD and
HD TDD networks in interference-limited scenario can be
obtained as
ˆ
Ruf (κ, W )=2πW0λ·(3a)
Zr>0
reλπr2Zt>0
e
rαbu (et
1)βκW
W0F1f(r, t)F0
2f(r, t, κ, W )dtdr,
ˆ
Rdf (κ, W )=2πW0λ·(3b)
Zr>0
reλπr2Zt>0
F1f(r, t)F2f(r, t, κ, W)dtdr,
ˆ
Ruh(Tu) = Tuˆ
Rh0,ˆ
Rdh(Td) = Tdˆ
Rh0,(3c)
where ˆ
Rh0= 2πW0λRr>0reλπr2Rt>0F1f(r, t)dtdr.
We can observe from (3) that the bidirectional average data
rates in FD network depend on both power ratio, κ, and
bandwidth allocated to each uplink user, W, which means that
the performance of FD network will be different under TDMA
and FDMA. By contrast, in HD network the bidirectional
average rates only depend on the time slot splitting, meaning
that multiple accessing strategies have no impact on the
performance.
III. RESOURCE CON FIG UR ATIO N UN DE R BIDIRECTIONAL
TRA FFIC AS YM ME TRY
A. Performance Metric
In the paper we use the number of users supported by a
network, K, as the performance metric, which is defined as
the minimum of the number of users supported in uplink, Ku,
and downlink, Kd, i.e., K= min(Ku, Kd). The values of Ku
and Kddepend on the bidirectional traffic requirements. To
model the asymmetric bidirectional traffics, we assume that
the data rate requirements of all users in either direction are
independent and identically distributed (i.i.d.), but no specific
distributions are assumed. Let Rui and Rdj denote the data rate
requirements of an arbitrary uplink user iand downlink user
j, which have the means, muand md, and variances, σ2
uand
σ2
d, respectively. With the random rate requirements, we define
Kuand Kdas the number of users that can be supported in
uplink and downlink with the probability no less than a given
value , respectively, where the value of is generally large,
e.g., = 95%.
B. HD Network
In this subsection we optimize the resource configuration
for HD dynamic TDD network. The optimization problem,
aimed at maximizing the number of supported users under
asymmetric bidirectional traffics, can be formulated as
max
Tu+Td=1 K=min(Ku, Kd)(4a)
s.t. PPKu
i=1Rui Tuˆ
Rh0(4b)
PPKd
j=1Rdj Tdˆ
Rh0, (4c)
where P{·} denotes the probability.
To solve problem (4), we observe that P{·} is a decreasing
function for both Kuand Kd, therefore for any given Tuand
Tdthe optimal solution can be obtained when constraint (4b)
and (4c) hold with equality.1Moreover, we can find from (4b)
and (4c) that Kuis an increasing function of Tu, while Kdis
a decreasing function of Tu. Therefore, in order to maximize
the minimum of Kuand Kd, i.e., Kin (4a), the optimal Tu
should be selected to make Ku=Kd=K. As a result,
problem (4) can be equivalently transformed as
max
Tu+Td=1 K(5a)
s.t. PPK
i=1Rui Tuˆ
Rh0=(5b)
PPK
j=1Rdj Tdˆ
Rh0=. (5c)
To solve problem (5), we first find explicit expressions for
constraint (5b) and (5c). Considering that the number of uplink
and downlink users supported in current and future networks
is generally large, we can employ the central limit theorem to
simplify the constraints. Take constraint (5b) as an example,
which can be transformed as
PPK
i=1Rui Tuˆ
Rh0= ΦTuˆ
Rh0Kmu
σuK=, (6)
where the first equality follows from central limit theorem,
and Φ(·)is the cumulative distribution function (CDF) of
the standard Gaussian distribution with zero mean and unit
variance. Letting Φ1(·)denote the inverse function of Φ(·),
we can rewrite problem (4) as
max
Tu+Td=1 K(7a)
s.t. Kmu+ Φ1()σuK=Tuˆ
Rh0(7b)
Kmd+ Φ1()σdK=Tdˆ
Rh0.(7c)
From (7), the optimal Kcan be solved as
K=Φ1()σud +qΦ2()σ2
ud + 4mud ˆ
Rh02
4m2
ud
,(8)
1Throughout the paper we consider that the numbers of users, Kuand Kd,
are continuous variables, and the integer constraints on Kuand Kdcan be
easily included by using floor operation to the obtained continuous values.
where σud ,σu+σdand mud ,mu+md.
From (7b) and (7c), we can obtain that the optimal time
slot splitting, T
uand T
d, satisfy
T
u
T
d
=mu·K+ Φ1()σu
mu
md·K+ Φ1()σd
md.(9)
Under a special case with σu
mu=σd
md, i.e., the standard
deviation of data rate requirement is proportional to the
average data rate requirement for both directions, we can
obtain from (9) that
T
u
T
d
=mu
md
.(10)
It is shown that in this case the time slots configured
to uplink and downlink are proportional to the bidirectional
average data rate requirements. An example for this special
case is when the data rate requirements of users follow
exponential distribution with mean muand mdfor uplink
and downlink, respectively, where the corresponding standard
deviations are σu=muand σd=md.
C. FD Network
In this subsection the resource configuration is optimized for
FD network, which has two differences from the optimization
of HD network. First, in FD network both uplink and downlink
use all time-frequency resources, and the power ratio of BSs
and users, i.e., κ, needs to be optimized instead of time
slot splitting. Second, as mentioned before, the bidirectional
performance in FD network depends on the bandwidth allo-
cated to each uplink user, W, which is different in TDMA
and FDMA networks. Therefore, the optimizations for FD
TDMA and FDMA networks are considered, respectively, in
the following.
1) FD Network with TDMA: In TDMA network each
uplink user can use full bandwidth, i.e., W=W0. Then, the
uplink and downlink average data rates in FD network given
in (3a) and (3b) only depend on the power ratio κ, which are
denoted by ˆ
Ruf (κ)and ˆ
Rdf (κ), respectively, for notational
simplicity.
To obtain the optimal Kin FD TDMA network, we can
solve problem (4) by replacing Tuˆ
Rh0in (4b) and Tdˆ
Rh0
in (4c) with ˆ
Ruf (κ)and ˆ
Rdf (κ), respectively. It is easy
to find that the optimal solution can be obtained when the
constraints in the resulting problem hold with equality. Then,
the optimization problem, aimed at maximizing the number of
supported users, can be formulated as
max
κK= min(Ku, Kd)(11a)
s.t. PPKu
i=1Rui ˆ
Ruf (κ)=(11b)
PPKd
j=1Rdj ˆ
Rdf (κ)=(11c)
κmin κκmax,(11d)
where κmin =Pb,min
Pu,max and κmax =Pb,max
Pu,min denote the lower
and upper bounds of power ratio κ, and Pb,max and Pu,max are
the maximal transmit powers of BSs and users, respectively.
To solve problem (11), noting that ˆ
Ruf (κ)is a decreasing
function of κand ˆ
Rdf (κ)is an increasing function of κ, we
can obtain from (11b) and (11c) that Kudecreases with κ
while Kdincreases with κ. Based on this result, the maximal
Kcan be found as follows.
First, omitting constraint (11d), we can find that the solu-
tions to the relaxed problem, denoted by ˜
K,˜
Ku,˜
Kdand ˜κ, are
obtained when ˜
Ku=˜
Kd=˜
K. By further applying the central
limit theorem as in HD network, the following equations are
satisfied
˜
Kmu+ Φ1()σup˜
K=ˆ
Ruf κ)(12a)
˜
Kmd+ Φ1()σdp˜
K=ˆ
Rdf κ),(12b)
from which the optimal ˜κand ˜
Kcan be easily obtained by
a bisection method.
Then, recalling that Kdincreases with κand Kudecreases
with κ, if ˜κ> κmax , we have Ku> Kdfor all κ
[κmin, κmax ], so that K=Kd, which can be obtained from
(12b) by setting κ=κmax and ˜
K=K. On the other hand,
if ˜κ< κmin, we have Ku< Kdfor all κ[κmin, κmax ], so
that K=Ku, which can be obtained from (12a) by setting
κ=κmin and ˜
K=K. Otherwise, if ˜κ[κmin , κmax], we
have K=˜
Kand κ= ˜κ.
2) FD Network with FDMA: When FDMA is considered,
the bandwidth allocated to each uplink user is W=W0
Ku, which
is a function of Ku. We can observe from (3a) and (3b) that
now the uplink and downlink average data rates of FD network
are determined by κ
Ku, which are denoted by ˆ
Ruf (κ
Ku)and
ˆ
Rdf (κ
Ku)for simplicity in FDMA network.
Similar to (4), the number of supported users can be
maximized as follows.
max
κK=min(Ku, Kd)(13a)
s.t. PPKu
i=1Rui ˆ
Ruf (κ
Ku)(13b)
PPKd
j=1Rdj ˆ
Rdf (κ
Ku)(13c)
κmin κκmax.(13d)
In the problems for HD dynamic TDD and FD TDMA
networks, Kuand Kdare constrained separately, e.g., in (4b)
and (4c), so that Kis maximized when Kuand Kdreach
their maximal values, respectively. In FD FDMA network,
Kdis constrained only in (13c), and thus the optimal Kcan
be obtained when Kdreaches its maximal value. For Ku,
however, since it is constrained in both (13b) and (13c), it is
not necessarily optimal to set Kuas its maximal value. Based
on the analysis, we can rewrite constraint (13b) and (13c) as
KuKmax
u(κ)(14a)
Kd=Kmax
d(κ
Ku
),(14b)
where Kmax
u(κ)and Kmax
d(κ
Ku)denote the maximal values
of Kuand Kdunder constraint (13b) and (13c), respectively.
Kmax
u(κ)and Kmax
d(κ
Ku)have the following properties.
Proposition 1: For any given κ,Kmax
u(κ)and Kmax
d(κ
Ku)
are obtained when constraint (13b) and (13c) hold with
equality, respectively. Moreover, Kmax
u(κ)is a decreasing
function of κ, and Kmax
d(κ
Ku)is an increasing function of
κ
Ku.
Proof: See Appendix A.
Based on Proposition 1 and the central limit theorem as
used in (6), the functions Kmax
u(κ)and Kmax
d(κ
Ku)can be
found from the following equations
Kmax
umu+ Φ1()σupKmax
u=ˆ
Ruf (κ
Kmax
u
)(15a)
Kmax
dmd+ Φ1()σdpKmax
d=ˆ
Rdf (κ
Ku
).(15b)
Since Kmax
d(κ
Ku)increases with κ
Kuaccording to Proposi-
tion 1 and further considering (14a) and (14b), we can rewrite
problem (13) as
max
κK=min(Ku, Kd)(16a)
s.t. KuKmax
u(κ)(16b)
Kd=Kmax
d(κ
Ku
)Kmax
d(κ
Kmax
u(κ))(16c)
κmin κκmax.(16d)
In order to maximize K=min(Ku, Kd)in problem (16), we
first investigate if the feasible regions of Kuand Kdoverlap.
If the regions overlap, then Kis maximized when Ku=Kd;
otherwise, Ku6=Kd. To this end, we need to compare the
upper bound of Ku, i.e., the term Kmax
u(κ)in (16b), and
the lower bound of Kd, i.e., the term Kmax
d(κ
Kmax
u(κ))in
(16c). Define ˜κas the solution to the equation Kmax
u(κ) =
Kmax
d(κ
Kmax
u(κ)),˜
K. By substituting ˜
Kand ˜κinto (15), we
have
˜
Kmu+ Φ1()σup˜
K=ˆ
Ruf (˜κ
˜
K)(17a)
˜
Kmd+ Φ1()σdp˜
K=ˆ
Rdf (˜κ
˜
K).(17b)
Since ˆ
Ruf (˜κ
˜
K)and ˆ
Rdf (˜κ
˜
K)are respectively decreasing and
increasing functions of ˜κ
˜
K, the value of ˜κcan be readily
computed with a bisection method.
According to Proposition 1, we know that Kmax
u(κ)de-
creases with κand Kmax
d(κ
Kmax
u(κ))increases with κ. There-
fore, if there exists κ˜κwithin its feasible region
[κmin, κmax ], then Kmax
u(κ)Kmax
d(κ
Kmax
u(κ))holds and
the feasible regions of Kuand Kdoverlap; otherwise, the
regions have no intersection. Based on the result, we next
solve problem (16) in two cases.
First, if κmin ˜κ, then there exists κ
[κmin,min(˜κ, κmax)] satisfying κ˜κ. In this case,
the feasible regions of Kuand Kdoverlap, and the
objective function of problem (16) is maximized when
K=Ku=Kd=Kmax
d(κ
Ku), where the final equality
comes from (16c). By substituting Ku=Kmax
d(κ
Ku)into
(15b), we obtain
Kmax
dmd+ Φ1()σdpKmax
d=ˆ
Rdf (κ
Kmax
d
).(18)
Fig. 1. Bidirectional resource configuration in FD and HD dynamic TDD
networks v.s. md
mu.
Since ˆ
Rdf (·)is an increasing function, we know that Kmax
d
must increase with the growth of κ. This means that Kmax
d
is maximized when κreaches its maximum, i.e., the optimal
κ= min(˜κ, κmax ). Given κ, the maximal Kmax
dcan be
obtained with a bisection method from (18). Finally, we have
the optimal K
u=K
d=K=Kmax
d.
Second, if κmin >˜κ, we have Kmax
u(κ)<
Kmax
d(κ
Kmax
u(κ))for all κ[κmin, κmax ], i.e., the maximal
possible value of Kuis smaller than the minimal possible
value of Kd. Therefore, it is clear that the optimal K=
K
u=Kmax
u(κ), where Kmax
u(κ)can be solved from
(15a) by choosing the optimal κ=κmin because Kmax
u(κ)
decreases with κaccording to Proposition 1.
IV. NUMERICAL RES ULT S
In this section, we evaluate the performance of FD and
HD networks based on the proposed resource configuration
methods, and investigate the performance gain of FD network
over traditional static TDD and dynamic TDD networks. The
following system parameter setups are considered. The system
bandwidth is 10 MHz, the noise power spectrum density is
174 dBm/Hz, and the noise figure is 9dB, from which
we can obtain the total noise power is 95 dBm [15]. The
density of BSs is set as λ=2×104m2, which corresponds
to an average cell radius of 40 m. The pathloss for the
channels between BSs, between users, and between BSs and
users are calculated based on the Hata model [16], where
the heights of BSs and users are set as 10 m and 1.5m,
respectively. The maximal transmit powers of BSs and users
are Pb,max =23 dBm and Pu,max =23 dBm, respectively [15].
In order to ensure that the networks operate in interference-
limited scenario, the minimal transmit power of BSs, Pb,min
is selected to satisfy the condition ˆ
Rh0¯
Rdh(Pb,min )
¯
Rdh(Pb,min )= 104
for HD static TDD network with Td=Tu, where ˆ
Rh0and
¯
Rdh are the average downlink rates in the cases without and
with noise as defined in Section II, respectively. This condition
means that the impact of ignoring noise on the average rate
Fig. 2. Performance gain of FD network over HD static TDD and dynamic
TDD networks v.s. md
mu.
should be very small. We can obtain that Pb,min =5.2dBm,
and the minimal transmit power of users can be obtained in
the same way as Pu,min =5.2dBm. Then, the range of
κcan be obtained as κmin = 0.0015 and κmax = 660.7.
The parameter reflecting the residual self-interference in FD
network is set as β=110 dB. The data rate requirements of
users are modeled as exponential distribution with means mu
and mdfor uplink and downlink, respectively, where muis set
as 100 kbps and different values of mdwill be considered. The
probability value used for defining the number of supported
users is set as = 95%. In static TDD network, the time slots
are equally allocated to uplink and downlink.
Figure 1 shows the optimal bidirectional power control
for FD TDMA and FDMA networks and the optimal time
slot splitting in HD dynamic TDD network, as a function
of the ratio of average downlink rate requirement to average
uplink rate requirement, md
mu. It is shown that in FD network
downlink-to-uplink transmit power ratio, κ, increases with md
mu
as expected. For a given md
mu, a higher κis required by FDMA
network compared to TDMA network. This means that given
κ, i.e., given the transmit powers of BSs and users, TDMA
network can achieve high downlink rate and low uplink rate,
while FDMA network can achieve low downlink rate but high
uplink rate. This is because compared to TDMA network, in
FDMA network each user transmits within a narrow band in
uplink, which increases the power spectrum of desired signal
but also increases the interference to downlink users, where
the BS needs to spread the power over full bandwidth. The
result suggests that TDMA is suitable for the scenarios where
downlink traffic dominates, while FDMA is suitable for the
scenarios where uplink traffic dominates. Moreover, we can
observe that in FDMA network κkeeps constant when md
mu5,
which reaches the maximal κmax. Yet, for md
mu<5in FDMA
network and for any md
muin TDMA network, we can observe
from the two curves that κincreases proportionally with
qmd
mk. Such a scaling result can be proven theoretically, which
however is not provided in the paper due to lack of space. For
HD dynamic TDD network, we can see that the ratio of time
slots configured for downlink and uplink increases linearly
with md
mu, which coincides with our analysis in Section III-B.
Figure 2 depicts the performance relationship between FD
network and HD static TDD as well as dynamic TDD network-
s. It is shown that compared to the static TDD network, FD
network with TDMA and FDMA can improve the network
performance evidently. When symmetric bidirectional traffic
requirements are considered, in which case the static TDD
network operates optimally, the gain near 40% can be achieved
by FD network. When the bidirectional traffic requirements
are asymmetric, FD network can even achieve the gain up to
130% over the static TDD network. Moveover, in FD network
TDMA can achieve higher gain over FDMA when downlink
traffic dominates, which agrees with the analysis in Fig. 1. The
gain of FD network over dynamic TDD network decreases
with the growth of traffic asymmetry as expected. When
typical values of md
muranging from four to six are considered
[17], FD network can provide a gain of 10% 20% compared
to dynamic TDD network.
V. CONCLUSIONS
In this paper we investigated the performance gain of FD
network over HD network including both traditional static
TDD network and dynamic TDD network. We maximized
the number of supported users in FD TDMA and FDMA
networks as well as HD dynamic TDD network by optimizing
bidirectional power control and time slot splitting, respectively,
where asymmetric uplink-downlink traffic requirements were
taken into account. Numerical results showed that different
from HD network where multiple accessing strategy has no
impact on the maximal number of supported users, in FD
network TDMA is suitable for the scenarios where downlink
traffic dominates, while FDMA is suitable for the scenarios
where uplink traffic dominates. Under asymmetric bidirec-
tional traffics, both FD network and dynamic TDD network
exhibit evident performance gains over the traditional static
TDD network. Compared to dynamic TDD network, the gain
of FD network changes with the traffic asymmetry, and the
gain up to 20% can be achieved for the typical downlink traffic
dominant scenarios.
APPENDIX A
PROO F OF PROPOSITION 1
For downlink, it is obvious from (13c) that Kdis maximized
when (13c) holds with equality and increases with κ
Kubecause
ˆ
Rdf increases with κ
Ku.
For uplink, we prove the properties of Kuby contradiction.
Let Kmax
udenote the maximal value of Kuconstrained by
(13b). Assume that (13b) holds with strict inequality when
Ku=Kmax
u, i.e., PPKmax
u
i=1 Rui ˆ
Ruf (κ
Kmax
u)> . Then,
we can always find a ˆ
Ku> Kmax
uso that PPˆ
Ku
i=1Rui
ˆ
Ruf (κ
Kmax
u)=. Since ˆ
Ruf (κ
Ku)is a decreasing function
of Was shown in (3a) and hence is an increasing function
with Ku, we have PPˆ
Ku
i=1Rui ˆ
Ruf (κ
ˆ
Ku)> . This
means that there exists a ˆ
Kuthat is larger than Kmax
uand
satisfies constraint (13b). This is contradictory with the fact
that Kmax
uis defined as the maximal value of Ku. Therefore,
the considered assumption is false, and Kuis maximized when
(13b) holds with equality.
We proceed to prove that Kmax
uis an increasing function
of κ. Define ¯
Kmax
uand ˆ
Kmax
uas the maximal number of
Kuwhen κequals to ¯κand ˆκ, respectively. Without loss of
generality, we set ˆκ > ¯κ. Then, we have =PPˆ
Kmax
u
k=1 Ruk
ˆ
Ruf (ˆκ
ˆ
Kmax
u
)<PPˆ
Kmax
u
k=1 Ruk ˆ
Ruf (¯κ
ˆ
Kmax
u
), where the
inequality comes from the fact that ˆ
Ruf (κ
Ku)decreases with
κ. The result shows that when κ= ¯κ,ˆ
Kmax
ucannot make
constraint (13b) hold with equality. It means that ˆ
Kmax
uis only
a feasible point, so that ˆ
Kmax
u<¯
Kmax
umust hold. Therefore,
Kmax
udecreases with κ.
REFERENCES
[1] Z. Shen, A. Khoryaev, E. Eriksson, and X. Pan, “Dynamic uplink-
downlink configuration and interference management in TD-LTE,” IEEE
Commun. Mag., vol. 50, no. 11, pp. 51–59, 2012.
[2] S. Chen and J. Zhao, “The requirements, challenges, and technologies
for 5G of terrestrial mobile telecommunication,” IEEE Commun. Mag.,
vol. 52, no. 5, pp. 36–43, 2014.
[3] A. Dowhuszko, O. Tirkkonen, J. Karjalainen, T. Henttonen, and
J. Pirskanen, “A decentralized cooperative uplink/downlink adaptation
scheme for TDD small cell networks,” in Proc. IEEE PIMRC, 2013.
[4] V. Venkatasubramanian, M. Hesse, P. Marsch, and M. Maternia, “On
the performance gain of flexible UL/DL TDD with centralized and
decentralized resource allocation in dense 5G deployments,” in Proc.
IEEE PIMRC, 2014.
[5] H. Lee and D.-H. Cho, “Combination of dynamic-TDD and static-TDD
based on adaptive power control,” in Proc. IEEE VTC-Fall, 2008.
[6] H. Sun, M. Sheng, M. Wildemeersch, and T. Quek, “Coverage analysis
for two-tier dynamic TDD heterogeneous networks,” in Proc. IEEE
GLOBECOM, 2014.
[7] P. Jayasinghe, A. Tolli, J. Kaleva, and M. Latva-aho, “Bi-directional
signaling for dynamic TDD with decentralized beamforming,” in Proc.
IEEE ICC Workshop, 2015.
[8] D. Zhu and M. Lei, “Cluster-based dynamic DL/UL reconfiguration
method in centralized RAN TDD with trellis exploration algorithm,”
in Proc. IEEE WCNC, 2013.
[9] M. Jain, J. Choi, T. Kim, D. Bharadia, S. Seth, K. Srinivasan, P. Levis,
S. Katti, and P. Sinha, “Practical, real-time, full duplex wireless,” in
Proc. ACM MOBICOM, 2011.
[10] M. Duarte, C. Dick, and A. Sabharwal, “Experiment-driven characteri-
zation of full-duplex wireless systems,” IEEE Trans. Wireless Commun.,
vol. 11, no. 12, pp. 4296–4307, 2012.
[11] S. Goyal, P. Liu, S. Hua, and S. Panwar, “Analyzing a full-duplex cellular
system,” in Proc. CISS, 2013.
[12] H. Alves, C. de Lima, P. Nardelli, R. Demo Souza, and M. Latva-aho,
“On the average spectral efficiency of interference-limited full-duplex
networks,” in Proc. CROWNCOM, 2014.
[13] J. Lee and T. Quek, “Hybrid full-/half-duplex system analysis in hetero-
geneous wireless networks,” IEEE Trans. Wireless Commun., vol. 14,
no. 5, pp. 2883–2895, 2015.
[14] Z. Tong and M. Haenggi, “Throughput analysis for full-duplex wireless
networks with imperfect self-interference cancellation,” IEEE Trans.
Commun., vol. 63, no. 11, pp. 4490–4500, 2015.
[15] 3GPP TR 36.814, “Further Advancements for E-UTRA Physical Layer
Aspects (Release 9),” 2010.
[16] A. Sadek and S. Shellhammer, “A unified path-loss model for
coexistence study,” 2008. [Online]. Available: https://mentor.ieee.org/
802.19/file/08/19-08-0006-00-0000-unified-path-loss-model.doc
[17] Report ITU-R M.2370, “IMT Traffic estimates for the years 2020 to
2030,” 2015.
... When traffic in the two directions of data links in BD-IFD communication is asymmetric, a part of the resources available in the link carrying less traffic cannot be used for data transmission and are thus wasted. This results in significant degradation of the gain in spectral efficiency caused by the in-band STR [21][22][23]. In the scenario considered in [10][11][12][13][14][15][16][17], given a traffic asymmetry resulting in a waste of resources in one of the two links, the previous studies provided no guidance as to how to use these remaining resources and how the corresponding performance changes in this case. ...
... Note that L a ,  e,a , and  e,a are not necessarily the same as M a ,  a , and  a , respectively, because Eve may not have perfect information of M a ,  a , and  a . From (18) and (19), we obtain ȳ e = [ȳ e (0), … ,ȳ e (L a − 1)] T , where from which we have The processes undertaken by Eve to wiretap the confidential information of Bob are equivalent to those in (16)- (21), except that y e in (16) is modified by ...
... The confidential information transmitted from Alice that is leaked to Eve can be quantified by analyzing the mutual information (MI) between the Tx signal of Alice and the Rx signal of Eve. However, it is difficult to analyze the MI directly from (21). This is because x a in (21) includes both data samples and jamming samples corresponding to x a and q a , respectively. ...
Article
In this paper, we describe a simultaneously transmitted jamming (ST‐jamming) for bi‐directional in‐band full‐duplex (IFD) system to improve information security at the physical layer. By exploiting ST‐jamming, each legitimate user transmits data samples and jamming samples together in one orthogonal frequency division multiplexing symbol according to given traffic asymmetry. Regardless of the traffic difference in both directions in IFD communication, eavesdropping of confidential information is prevented in both directions simultaneously without the loss of data rate. We first propose an encoding scheme and the corresponding decoding scheme for ST‐jamming to be used by the legitimate users. In addition, we study a transceiver structure of the legitimate users including a baseband modem uniquely designed for the use of ST‐jamming. The leakage of confidential information at an eavesdropper is then quantified by studying the mutual information between the confidential transmit signals and the received signals of the eavesdropper. Simulation results show that the proposed ST‐jamming significantly reduces the leakage of legitimate information at the eavesdropper.
... Malik et al. [12] jointly adopted power control and rate allocation to maximize the downlink transmission rate, while guaranteeing the uplink transmission requirement. Liu et al. [13], [14] considered bidirectional traffic asymmetry and investigated the performance gain of the FD cellular network over the HD network, when different multiplexing techniques (say, time division multiplexing, frequency division multiplexing) are employed in an FD cellular network. Sarret et al. [15] considered a 5G ultra-dense small cell network and analyzed the performance of symmetric and asymmetric transmissions. ...
... To make them equal, we can set different contention windows (CWs) for the two types of nodes, so that half-duplex nodes have more channel access opportunities than FD nodes. To calculate CWs, we can set the throughput ratio between half-duplex and FD nodes to 1, and then solve the corresponding CW, where the throughput of a half-duplex node can be calculated by (13) in [25], and the throughput of a FD node can be calculated by (19) and (20). ...
... In the following, we explain P i (1 ≤ i ≤ 3) in (13) and each instance of T AP→DD . ...
Article
Full-text available
In smart home networks, the traffic is often asymmetric (i.e., the uplink traffic load of a node is not equal to its downlink traffic load). This paper is concerned with how to achieve asymmetric transmission for a full-duplex (FD) IoT network (where the AP and nodes are FD-enabled). Most existing related schemes considered a partial FD network consisting of an FD AP and half-duplex (HD) nodes, and achieved asymmetric transmission via PHY-layer mechanisms such as power control. However, for an FD network, the MAC-layer scheduling mechanism might be better to achieve asymmetric transmission than the PHY-layer power-control mechanism which will introduce complex interference management. To this end, we propose a simple and novel MAC scheduling scheme called AT-MAC to support Asymmetric Transmission in an FD IoT network. In our design, we differentiate uplink-dominant (UD) and downlink-dominant (DD) nodes. Upon receiving a packet, a receiver determines whether to execute a reverse transmission to the peer or to initiate a new transmission to a third node, according to the type of UD and DD nodes. Next, we develop a theoretical framework to evaluate the throughput of AT-MAC. Extensive simulations verify that our design is very effective (namely, it can achieve the asymmetric transmission, while fully utilizing the FD gain to maximize the system throughput and lower the packet delay) and our theoretical model is very accurate. This study is very helpful for designing quality-of-service-oriented FD MAC protocols.
... However, this is not the case for full duplex over dynamic TDD. Based on recent research [17], the gain of pure full duplex (FD) mode over dynamic TDD mode is marginal in typical downlink traffic dominant scenario, which cannot justify the application of FD technique to cellular networks by simply replacing current HD BSs with FD BSs. Therefore, the flexible use of full duplex is attracting more and more attentions. ...
... The adaptive downlink power control strategy in hybrid-link region was used to reduce severe BS-BS interference 2009 [10] Proposed two time slot allocation strategies to mitigate the cross-slot interference introduced by TDD 2012 [11] A tutorial overview of dynamic uplink-downlink configuration and interference management in time-division Long Term Evolution 2013 [12] Proposed a novel cluster-based dynamic downlink/uplink reconfiguration method in centralized TDD networks with dense deployment of remote radio units 2014 [13] Proposed a policy that leads to different associations in uplink and downlink, and derive the load-aware coverage probability based on a two-tier HetNet operating with dynamic TDD 2015 [14] Proposed a novel bi-directional signaling scheme for decentralized beamformer design to maximize the weighted sum rate (WSR) of multi-cell multi-user multiple-input multiple-output dynamic TDD system. 2016 [17] Studied the performance gain of FD network over TDD network based on asymmetric bidirectional traffics 2017 [16] Antenna isolation combining with active cancellation stages in the analog and/or digital domain was introduced to suppress SI for FD 2017 [18] XD mode is proposed which is a flexible HD-FD hybrid transmission mode to obtain the performance of FD 2018 [15] Proposed a new CLI suppression schemes using advanced receivers, e.g., MMSE-IRC receiver and enhanced MMSE-IRC (eMMSE-IRC) receiver 2020 [19] NOD is firstly proposed, which imports the FD mode on the basis of fully dynamic TDD, and its capacity region was analyzed for MA signatures, NOMA schemes can be further classified into bit-level and symbol-level processing-based NOMA schemes as shown in Fig. 8. The detailed summary of proposed NOMA schemes and basic principle of MA signatures is provided in Table 3. ...
Article
Full-text available
5G has achieved large-scale commercialization across the world and the global 6G research and development is accelerating. To support more new use cases, 6G mobile communication systems should satisfy extreme performance requirements far beyond 5G. The physical layer key technologies are the basis of the evolution of mobile communication systems of each generation, among which three key technologies, i.e., duplex, waveform and multiple access, are the iconic characteristics of mobile communication systems of each generation. In this paper, we systematically review the development history and trend of the three key technologies and define the Non-Orthogonal Physical Layer (NOPHY) concept for 6G, including Non-Orthogonal Duplex (NOD), Non-Orthogonal Multiple Access (NOMA) and Non-Orthogonal Waveform (NOW). Firstly, we analyze the necessity and feasibility of NOPHY from the perspective of capacity gain and implementation complexity. Then we discuss the recent progress of NOD, NOMA and NOW, and highlight several candidate technologies and their potential performance gain. Finally, combined with the new trend of 6G, we put forward a unified physical layer design based on NOPHY that well balances performance against flexibility, and point out the possible direction for the research and development of 6G physical layer key technologies.
... However, this is not the case for full duplex over dynamic TDD. Based on recent research [17], the gain of pure full duplex (FD) mode over dynamic TDD mode is marginal in typical downlink traffic dominant scenario, which cannot justify the application of FD technique to cellular networks by simply replacing current HD BSs with FD BSs. Therefore, the flexible use of full duplex is attracting more and more attentions. ...
... The adaptive downlink power control strategy in hybrid-link region was used to reduce severe BS-BS interference 2009 [10] Proposed two time slot allocation strategies to mitigate the cross-slot interference introduced by TDD 2012 [11] A tutorial overview of dynamic uplink-downlink configuration and interference management in time-division Long Term Evolution 2013 [12] Proposed a novel cluster-based dynamic downlink/uplink reconfiguration method in centralized TDD networks with dense deployment of remote radio units 2014 [13] Proposed a policy that leads to different associations in uplink and downlink, and derive the load-aware coverage probability based on a two-tier HetNet operating with dynamic TDD 2015 [14] Proposed a novel bi-directional signaling scheme for decentralized beamformer design to maximize the weighted sum rate (WSR) of multi-cell multi-user multiple-input multiple-output dynamic TDD system. 2016 [17] Studied the performance gain of FD network over TDD network based on asymmetric bidirectional traffics 2017 [16] Antenna isolation combining with active cancellation stages in the analog and/or digital domain was introduced to suppress SI for FD 2017 [18] XD mode is proposed which is a flexible HD-FD hybrid transmission mode to obtain the performance of FD 2018 [15] Proposed a new CLI suppression schemes using advanced receivers, e.g., MMSE-IRC receiver and enhanced MMSE-IRC (eMMSE-IRC) receiver 2020 [19] NOD is firstly proposed, which imports the FD mode on the basis of fully dynamic TDD, and its capacity region was analyzed for MA signatures, NOMA schemes can be further classified into bit-level and symbol-level processing-based NOMA schemes as shown in Fig. 8. The detailed summary of proposed NOMA schemes and basic principle of MA signatures is provided in Table 3. ...
Preprint
Full-text available
5G has achieved large-scale commercialization across the world and the global 6G research and development is accelerating.To support more new use cases, 6G mobile communication systems should satisfy extreme performance requirements far beyond 5G. The physical layer key technologies are the basis of the evolution of mobile communication systems of each generation, among which three key technologies, i.e., duplex, waveform and multiple access, are the iconic characteristics of mobile communication systems of each generation. In this paper, we systematically review the development history and trend of the three key technologies and define the Non-Orthogonal Physical Layer (NOPHY) concept for 6G, including Non-Orthogonal Duplex (NOD), Non-Orthogonal Multiple Access (NOMA) and Non-Orthogonal Waveform (NOW). Firstly, we analyze the necessity and feasibility of NOPHY from the perspective of capacity gain and implementation complexity. Then we discuss the recent progress of NOD, NOMA and NOW, and highlight several candidate technologies and their potential performance gain. Finally, combined with the new trend of 6G, we put forward a unified physical layer design based on NOPHY that well balances performance against flexibility, and point out the possible direction for the research and development of 6G physical layer key technologies.
... The evaluation process known as the Firefly algorithm is used to determine the best bit rate. It is composed of three fundamental regulations that guide the blinking pattern and activity of fireflies [7]. ...
Article
Full-text available
The major goal is to determine how to allocate resources in a full-duplex cloud radio access network. Furthermore, due of the dispersed characteristic of the Portable Broadcasting Antenna that decreases self-interference. A full-duplex communication system enables information to be sent and processed at the same time among terminals. It has a bandwidth efficiency that is double that of a half-duplex data transmission. The goal of the research is to determine the best power allocation for the receiver transmitter whenever the flow of information is at its highest. The Enhanced Firefly Algorithm is used for efficiency. It's an improvement process that operates in the same way that a firefly's fascination to strobe does. The stronger light encourages the less brilliant firefly to come closer. It's an iterative procedure, and also the community of fireflies finally propagates on the strongest one. The matching power value is logged whenever the optimum inverted information rate is reached, and it is used to distribute amongst radio transmitter and several station receiver heads. Energy parameters are fixed to select the optimal derivative. Lastly, using NS2 to depict graphical representations, the suggested technique is superior to generalized benders decomposition (GBD)-based resource allocation (GRA) algorithm.
... In contrast, DTDD obviates the need for expensive and potentially power-hungry hardware as well as digital signal processing costs associated with SI mitigation. Numerical experiments have shown that the throughput of the cellular FD-system degrades relative to cellular DTDD as the asymmetry between the UL and the DL traffic increases [17]. ...
Preprint
Full-text available
We consider a dynamic time division duplex (DTDD) enabled cell-free massive multiple-input multiple-output (CF-mMIMO) system, where each half-duplex (HD) access point (AP) is scheduled to operate in the uplink (UL) or downlink (DL) mode based on the data demands of the user equipments (UEs). The goal is to maximize the sum UL-DL spectral efficiency (SE). We theoretically establish the sub-modularity of the sum SE, which allows us to develop a new, low complexity, greedy algorithm for the combinatorial AP scheduling problem, with guaranteed optimality properties. We also consider pilot sequence reuse among the UEs to limit the channel estimation overhead. In CF systems, all the APs estimate the channel from every UE, making pilot allocation problem different from the cellular case. We develop a novel algorithm that iteratively minimizes the maximum pilot contamination across the UEs. We compare our solutions, both theoretically and via simulations, against a full duplex (FD) multi-cell mMIMO system. Our results show that, due to the joint processing of the signals at the central processing unit, CF-mMIMO with dynamic HD AP-scheduling significantly outperforms cellular FD-mMIMO in terms of the sum SE and 90% likely SE. Thus, DTDD enabled HD CF-mMIMO is a promising alternative to cellular FD-mMIMO, without the cost of hardware for self-interference suppression.
Article
We consider a dynamic time division duplex (DTDD) enabled cell-free massive multiple-input multiple-output (CF-mMIMO) system, where each half-duplex (HD) access point (AP) is scheduled to operate in the uplink (UL) or downlink (DL) mode based on the data demands of the user equipments (UEs), with the goal of maximizing the sum UL-DL spectral efficiency (SE). We develop a new, low complexity, greedy algorithm for the combinatorial AP scheduling problem, with an optimality guarantee theoretically established via showing that a lower bound of the sum UL-DL SE is sub-modular. We also consider pilot sequence reuse among the UEs to limit the channel estimation overhead. In CF systems, all the APs estimate the channel from every UE, making pilot allocation problem different from the cellular case. We develop a novel algorithm that iteratively minimizes the maximum pilot contamination across the UEs. We compare the performance of our solutions, both theoretically and via simulations, against a full duplex (FD) multi-cell mMIMO system. Our results show that, due to the joint processing of the signals at the central processing unit, CF-mMIMO with dynamic HD AP-scheduling significantly outperforms cellular FD-mMIMO in terms of the sum SE and 90% likely SE. Thus, DTDD enabled HD CF-mMIMO is a promising alternative to cellular FD-mMIMO, without the cost of hardware for self-interference suppression.
Article
Network-assisted full-duplex (NAFD) distributed massive multiple-input multiple-output (MIMO) systems enable simultaneous uplink and downlink communications by dynamically allocating the numbers of uplink and downlink remote antenna units (RAUs), which potentially improve the spectral efficiency in wireless communications. In such systems, channel state information (CSI) plays a critical role in uplink reception and downlink transmission, as well as the cross link interference cancelation caused by downlink RAUs to uplink RAUs. Moreover, downlink terminals need to estimate CSI to reliably decode the received signals due to the reduced channel hardening effect. However, high training overhead makes it generally impossible to directly estimate CSI. This paper proposes to estimate effective CSI (inner products of beamforming and channel vectors) instead based on beamforming training scheme. Under this scheme, we derive closed-form expressions for uplink and downlink achievable rates with different receivers and beamforming. Given these expressions, we propose an efficient power allocation scheme which is only dependent on slowly varying large-scale fading from the perspective of multi-objective optimization. Numerical results verify the accuracy of the derived closed-form expressions and effectiveness of beamforming training based CSI estimation. Moreover, trade-off regions between the considered optimization objectives under various system parameters offer numerous flexibilities for system optimization.
Article
Existing wireless mobile networks configure the uplink (UL) and downlink (DL) resources based on the orthogonal duplex principle, which has significantly evolved from the static frequency/time division duplex (FDD/TDD) to the semi-dynamic TDD in 4G and the fully-dynamic TDD in 5G. Fueled by the successful realizations of full duplex (FD) transmission, non-orthogonal duplex (NOD) emerges as an attractive candidate technique for future networks to improve the bidirectional throughput. In this paper, we investigate the performance limit of the NOD scheme, which imports the FD mode on the basis of fully-dynamic TDD. We first focus on a single-cell scenario by assuming no cooperation among cells, and strive to characterize the bidirectional capacity region by finding the capacity-optimal transmission mode scheduling policy. We obtain the optimal policies for the systems with and without modulation and coding scheme (MCS), respectively, where the policies are based on the instantaneous channel gains and the distribution of channels. We proceed to develop a scheduling policy that only relies on the instantaneous channel and queue information, and extend it to the multicell multiuser scenario with coordinated scheduling. Numerical and simulations results demonstrate the great potential of the NOD scheme in increasing bidirectional capacity and reducing the queuing delay.
Article
In this paper, we study joint interference cancellation and resource allocation for full-duplex (FD) cloud radio access networks (C-RAN) with antenna correlation. The target is to maximize the capacity of downlink (DL) user equipments (UEs) with guaranteed quality of service (QoS) of UL UEs under the constraints of DL and uplink (UL) transmit power. Intractability of the considered problem involves non-convexity and coupling between postcoding and remote radio head (RRH) selection. To deal with the high coupling between system variables, an estimation-free selfinterference (SI) cancellation (EFSC) scheme with merit of significantly reducing signaling overhead for channel estimation is proposed. The reduced signaling overhead is also derived in closed form expression. Furthermore, we propose a generalized Benders decomposition based resource allocation (GRA) algorithm, which separates the continuous and discrete variables to solve the optimization problem. With the design of a flexible utility function, the tradeoff between DL capacity and co-channel interference (CCI) can be achieved. Moreover, we identify the scenario in which antenna correlation will be beneficial for both UL and DL communications in FD C-RAN with the implementation of EFSC scheme. The effectiveness of proposed methods and theorems are verified via simulation results.
Conference Paper
Full-text available
This paper studies how dense deployments of small cells with full duplex technology perform under various network configurations and channel conditions. The resulting interference at the receiver of interest combines both its intrinsic self-interference and components from co-channel base stations and user equipment transmissions. Network deployment is represented by a Poisson field of transmitters, while a composite channel with log-normal shadowing and Nakagami-m fading describes our propagation model. Herein, a stochastic geometry framework is used to first characterize the interference profiles for the full duplex scenarios under consideration, and then derive closed-form expressions for the Average Spectral Efficiency (ASE). Results show that the Self-Interference (SI) dominates the aggregate interference component and Full-Duplex (FD) networks outperform Half-Duplex (HD) networks in terms of ASE for SI cancellation values lower than70dB. I. INTRODUCTION By 2020, a myriad of connected devices will change the way we live, make business, gather into social groups and interact. As a result, the next generation of mobile access networks will experience a thousand-fold increase in traffic volume compared to today's standards, which will require new technologies and practices as well as a rearrangement of the spectrum. In this context Full-Duplex (FD) communication appears as a promising spectrally efficient technology, since, theoretical FD systems can double the overall spectral efficiency when compared to the traditional Half-Duplex (HD) networks [1]–[3]. In a FD network, devices are able to transmit and receive simultaneously and in the same frequency band, which brings high spectral efficiency for the upcoming wireless communication systems [1]–[6]. However, in practice such gain is not attainable once FD nodes suffer from Self-Interference (SI) and extra Co-Channel Interference (CCI) from other concurrent (same-type) transmitters [7], therefore its performance is severely deteriorated. Nevertheless, due to such potential, FD communications have gained considerable attention and several papers appeared recently with promising signal processing
Article
Full-text available
This paper investigates the throughput for wireless network with full-duplex radios using stochastic geometry. Full-duplex (FD) radios can exchange data simultaneously with each other. On the other hand, the downside of FD transmission is that it will inevitably cause extra interference to the network compared to half-duplex (HD) transmission. Moreover, the residual self-interference has negative effects on the network throughput. In this paper, we focus on a wireless network of nodes with both HD and FD capabilities and derive and optimize the throughput in such a network. Our analytical result shows that if the network is adapting an ALOHA protocol, the maximal throughput is achieved by scheduling all concurrently transmitting nodes to work in either FD mode or HD mode depending on one simple condition. Moreover, the effects of imperfect self-interference cancellation on the signal-to-interference ratio (SIR) loss and throughput are also analyzed based on our mathematical model. We rigorously quantify the impact of imperfect self-interference cancellation on the throughput gain, transmission range, and other metrics, and we establish the minimum amount of self-interference suppression needed for FD to be beneficial.
Article
Full-text available
In this article, we summarize the 5G mobile communication requirements and challenges. First, essential requirements for 5G are pointed out, including higher traffic volume, indoor or hotspot traffic, and spectrum, energy, and cost efficiency. Along with these changes of requirements, we present a potential step change for the evolution toward 5G, which shows that macro-local coexisting and coordinating paths will replace one macro-dominated path as in 4G and before. We hereafter discuss emerging technologies for 5G within international mobile telecommunications. Challenges and directions in hardware, including integrated circuits and passive components, are also discussed. Finally, a whole picture for the evolution to 5G is predicted and presented.
Article
This paper introduces a novel bi-directional signaling scheme for decentralized beamformer design to maximize the weighted sum rate (WSR) of multi-cell multi-user multiple-input multiple-output dynamic time division duplexing (TDD) system. In particular, the base stations are assumed to be either in uplink or downlink state based on the instantaneous traffic demand. The WSR maximization problem is solved via the corresponding weighted sum mean-squared error (MSE) minimization problem. An iterative algorithm is proposed with the bi-directional signaling embedded into the TDD frame structure. A detailed signaling architecture is proposed to facilitate channel estimation, exchanging the user beamformers and the user MSE weight matrices among the coordinating nodes. The proposed coordinated system is compared with the uncoordinated system while taking into account the overhead originated from bi-directional signaling. Finally, a periodic beamformer re-initialization strategy is introduced, which enhances the beamformer convergence rate and the system performance in a time-correlated fading environment. The proposed coordinated system provides significant performance gain in an interference limited environment.
Article
Ultra dense small cell deployments and a very large number of applications are expected to be the essential aspects of the newly emerging 5th generation (5G) wireless communication system. To match the diverse quality of service requirements imposed by a variety of applications, dynamic TDD is proposed as a solution by enabling flexible utilization of the spectrum for uplink and downlink of each cell. In this paper, the system performance of flexible (dynamic) TDD is compared to a fixed portioning of resources for uplink and downlink. Further, the degree of centralization for resource management is investigated in the context of dynamic TDD, because multi-cell scheduling will be important for the design of 5G ultra-dense network architecture. The results show that dynamic TDD is indeed a very promising option for 5G networks, and substantially decreases packet outage delays. We find that the performance gap between centralized and decentralized scheduling is small in case of planned deployments. However, centralized scheduling may be beneficial in certain dynamic TDD deployment scenarios with a very asymmetric access point distribution.
Conference Paper
Over the last decade, mobile data traffic has risen dramatically and the amount of UL and DL transmissions has been characterized by substantial asymmetry and time variations. Dynamic time-division duplex (TDD) has the capability to accommodate to the traffic asymmetry by adapting the UL/DL configuration to the current traffic demands. In this work, we study a two-tier heterogeneous network (HetNet) where the macro tier and small cell tier both operate dynamic TDD and use orthogonal frequency bands. We propose a policy that leads to different associations in UL and DL, and derive the load-aware coverage probability. We evaluate how the association policy affects the system performance and derive the UL/DL configuration, base station density, and bias factor that maximize the per tier or network-wide coverage probability. Index Terms—Small cell network, dynamic time-division du-plex, stochastic geometry
Conference Paper
In this paper, we propose and evaluate a novel cluster-based dynamic downlink/uplink reconfiguration method in centralized TDD networks with dense deployment of remote radio units. All cells of interest are first divided into disjoint cell clusters. Cells that are highly interfered with each other are grouped into the same cluster. The central control units of the network optimize and reconfigure the downlink/uplink allocations on the basis of cell cluster. The optimization-reconfiguration aims at maximizing the overall system throughput and adapting the traffic variations. In addition, we investigate the use of the trellis exploration algorithm to facilitate the optimization-reconfiguration process with low complexity. System level simulations validate the effectiveness of our proposed approach.
Conference Paper
This paper presents a cooperative decentralized scheme for adjusting the Uplink (UL)-Downlink (DL) configuration of a Small Cell Network (SCN) with a TDD air interface. The goal of the cooperative decentralized scheme is to make a more efficient use of common wireless resources, selecting convenient TDD-frame configurations to maximize a sum utility function that takes into account both individual traffic demands and actual interference coupling situations. The cooperative decentralized scheme for UL/DL adaptation can be executed locally at each Base Station (BS), and relies solely on the exchange of low-rate signaling information among neighboring cells. Based on observed performance improvements, we conclude that cooperative decentralized schemes are a viable option for flexible-TDD implementation in SCN environments, particularly in presence of cells with strong interference coupling and low-rate signaling capabilities.
Article
Full-duplex (FD) radio has been introduced for bidirectional communications on the same temporal and spectral resources so as to maximize spectral efficiency. In this paper, motivated by the recent advances in FD radios, we provide a foundation for hybrid-duplex heterogeneous networks (HDHNs), composed of multi-tier networks with a mixture of access points (APs), operating either in bidirectional FD mode or downlink half-duplex (HD) mode. Specifically, we characterize the net- work interference from FD-mode cells, and derive the HDHN throughput by accounting for AP spatial density, self-interference cancellation (IC) capability, and transmission power of APs and users. By quantifying the HDHN throughput, we present the effect of network parameters and the self-IC capability on the HDHN throughput, and show the superiority of FD mode for larger AP densities (i.e., larger network interference and shorter communication distance) or higher self-IC capability. Furthermore, our results show operating all APs in FD or HD achieves higher throughput compared to the mixture of two mode APs in each tier network, and introducing hybrid-duplex for different tier networks improves the heterogenous network throughput.
Article
Transmissions in different cells of a time-division duplex system are typically synchronous in order to eliminate the base station-to-base station and terminal-to-terminal interference. The synchronous operation limits dynamic resource configuration for downlink and uplink transmissions. Today, as a large percentage of mobile traffic is generated in hotspots and indoor environments, heterogeneous networks comprising high-power/wide-area and low-power/local-area network nodes are becoming a reality. Such heterogeneous networks provide opportunities to exploit dynamic uplink-downlink configuration in TDD systems, adapting to the individual traffic needs of a specific cell area. This article presents a tutorial overview of dynamic uplink-downlink configuration and interference management in time-division Long Term Evolution, including motivations, target deployment scenarios, opportunities and challenges, system requirements, design aspects, and performance evaluations.